This post has been de-listed
It is no longer included in search results and normal feeds (front page, hot posts, subreddit posts, etc). It remains visible only via the author's post history.
Hello,
I've been struggling for over four days to assess a mobile application developed with Flutter. It seems that the app is using a non-standard system proxy for its requests. I attempted to listen on all interfaces of the mobile emulator in Android Studio, but encountered some unusual behavior. Despite capturing traffic on various interfaces and experimenting with different APIs (27, 28, 29, 30, 34) with and without Google Play, I could only observe one request going to Supabase, which the app utilizes for its authentication mechanism. However, I couldn't detect their backend, even after thorough analysis. I've attached a picture containing a pcap file of intercepted packets on the mobile device. My intention is to configure iptables to redirect traffic to my Burp Suite on the local machine. Unfortunately, I couldn't find anything noteworthy containing HTTP/HTTPS requests on non-standard ports. If anyone has attempted anything useful, please let me know. I would greatly appreciate any assistance. It's worth noting that the app is obfuscated.
Subreddit
Post Details
- Posted
- 6 months ago
- Reddit URL
- View post on reddit.com
- External URL
- reddit.com/r/AskNetsec/c...